In a perfect world where we can trust anyone and nobody makes a mistake we don’t need security. In real life however bad things happen to our network so we’ll need to protect it.
This lesson is an introduction to access-lists and you’ll learn the difference between standard and extended access-lists.
Access-lists work on the network (layer 3) and the transport (layer 4) layer and can be used for two different things:
Filtering is used to permit or deny traffic reaching certain parts of our network. Without filtering traffic can go anywhere, if you look at the picture above you probably don’t want IP packets from the internet to freely enter your network. You can also use an access-list to block IP packets from 22.214.171.124 /24 going to 126.96.36.199 /24 or something else.
Classification does not drop IP packets like filtering does but we use it to “select” traffic. Let’s take a look at an example:
In the picture above we have a VPN that encrypts traffic between the two routers. Whenever we create a VPN we can use an access-list to “select” what traffic should be encrypted. Perhaps I want traffic from network 192.168.2.0 /24 to be encrypted but traffic from 172.16.2.0 /24 not. We can use an access-list to “select” traffic, this is called classification.
Let’s take a closer look at filtering. After creating an access-list there are 3 spots where you can place them:
You can put them inbound on the interface which means that all packets that reach your router will hit the access-list and will have to be checked against the access-list.
Another option is to put the access-list outbound. In this case IP packets will go through the router and once they are leaving the interface they will be checked against the access-list. When you place an access-list outbound, this is what your router will do:
- IP Packets will enter your router.
- Your router will check if it knows about the destination by looking in its routing table.
- If there is no entry in the routing table the IP packet will be discarded.
- If there is an entry in the routing table it will select the correct outgoing interface.
- If there is no access-list the IP packet will be sent out of the interface.
- If there is an access-list we’ll have to check our IP packet and compare it with the access-list.
- If the IP packet is permitted it will be forwarded, otherwise it will be discarded and go to IP heaven.
The third option is applying it to the VTY line. We can use this to secure telnet and/or SSH traffic.
Let me give you an example of what an access-list looks like: